What's keeping your business secure from cyber threats?
Find out how your business can save 90% or more on IT support and managed services plus essential cybersecurity monitoring versus the cost of staffing a team of full-time specialists
Essential services to keep your business safe, including:
from
$159.00
seat/month
Backup Storage: Help Desk Support: Onsite Support:
50GB/seat 1 hr/seat/month Billable
Microsoft 365 & Google Workspace Protection
Managed Endpoint Detection and Response
24x7x365 REALTIME THREAT MONITORING
Ransomware Detection and Remediation
Managed Endpoint Backup and Restore
Business Email Compromise Defense
Managed Antivirus/Malware Protection
Firewall Security EVENT Monitoring
Performance Monitoring and Management
OS/Software Update/Patch Management
Security Awareness Training
Phishing Scam Simulation Campaigns
Dark Web Monitoring and Alerting
Optional Cyber Liability Warranty Coverage
Advanced Care
Remote Unlimited
Everything included with Cybersecurity Complete, plus:
from
$279.00
seat/month
Backup Storage: Help Desk Support: Onsite Support:
250GB/seat Unlimited 20% Discount
Microsoft 365 / Azure / Domain Administration
Backup and
Restore for Microsoft Azure
Network-Attached Storage Protection
Stateless/ Next-Gen Firewall Management
Secure Wireless Network Management
Voice-Over-IP Phone System Management
Surveillance Camera System Management
Technology Consulting Services
Compliance Framework Verification
Extended Support
Total Unlimited
Everything included with Remote Unlimited, plus:
from
$399.00
seat/month
Backup Storage: Help Desk Support: Onsite Support:
250GB/seat Unlimited Unlimited
Hardware Install/Move/ Add/Change
Layer 1 Network Management
Failure Troubleshooting and Diagnostics
Employee Onboarding/ Offboarding
Infrastructure Project Design Services
What's keeping your business secure from cyber threats?
Your business can save 90% or more on IT support and managed services plus essential cybersecurity monitoring versus the cost of staffing a team of full-time specialists
Backup Storage: Help Desk Support: Onsite Support:
250GB/seat Unlimited Unlimited
Everything included with Remote Unlimited, plus:
Hardware Install/Move/Add/Change
Layer 1 Network Management
Failure Troubleshooting & Diagnostics
Employee Onboarding/Offboarding
Infrastructure Project Design Services
24x7x365 PROTECTION KEEPS YOU SECURE
Threat actors don't follow a 9-to-5 schedule, and neither do we—24x7x365 Advanced Threat Detection guards you day and night
30+ Years in Technology... and Counting!
With experience in both the defense and commercial enterprise sectors, we have the requisite expertise to keep you safe
Unrivaled Support for All Your Devices
Call, email or submit a support ticket right from your desktop. We're here to address all of your technology needs
How would a breach or data loss impact your business?
Post-Breach Repercussions Begin to Look Similar Regardless of the Type of Compromise
The actions that businesses and organizations take after a breach can vary widely depending on different factors. One driving factor is whether the breach involved personal or corporate data; regardless, repercussions for cyber insurance were among the top effects. There is also a larger impact to data itself—security decision-makers who reported breaches in the past 12 months also reported the effects, including data manipulation, extortion of data, theft of data, destruction of data, and ransom of data as being some of the top consequences.
What does your business do to protect data in the cloud?
The Shared Responsibility Model and the Importance of Cloud Backups
Many businesses and organizations mistakenly believe that cloud data is automatically protected by Software-as-a-Service (SaaS) vendors such as Microsoft and Google. In reality, 1 in 3 companies report losing data stored in cloud-based applications due to malware or ransomware attacks, malicious end-user activity, and accidental data overwrites. SaaS providers ensure they won’t lose your cloud data with built-in redundancy and other high availability measures; however, they do not take responsibility for restoring data if you lose it.
Ransomware isn’t only an on-premises problem. It can and does spread into SaaS applications, especially Microsoft 365. Unfortunately, many businesses and organizations still believe that these tools make backup obsolete… this simply isn’t true. Backup is just as important for data in SaaS apps as it is for data hosted on-premises.
Common SaaS Myths and Misconceptions
SaaS Applications Do Not Require Backup
While SaaS applications have built-in redundancy that protects against data loss in their cloud servers, this doesn’t protect against user error, accidental and malicious deletion, or ransomware attacks. While accidental deletion of files is by far the most common form of data loss in SaaS apps, ransomware can be the most damaging. That’s because ransomware is designed to spread across networks and into SaaS applications, impacting many users.
Microsoft and Google are Responsible for Backups
SaaS providers ensure they won’t lose your cloud data with built-in redundancy and other high availability measures; however, they do not take responsibility for restoring data if you lose it. Microsoft calls this the Shared Responsibility Model for data protection. That’s why Microsoft recommends third-party SaaS backup in its user agreement.
The Shared Responsibility Model places the onus of data protection squarely on businesses that rely on SaaS services. SaaS providers are responsible for keeping their infrastructure up and running, but businesses are responsible for the preservation and security of their data.
Google Vault is a Viable Backup Solution for Google Drive
Google Vault retention and eDiscovery cannot replace a data backup solution. It’s true that the retention and hold features that Google Vault provides can secure your business data from being lost and deleted. But that is only part of the solution. Google Vault is a retention service and should not be confused with a backup solution. Even though both retention and backup involve securing data for longer periods or indefinitely there are a few differences.
One major difference is that a retention solution is only concerned with retaining data while a backup solution offers an easy method to restore this data back into your account. Google Vault is a retention solution that was intended to preserve critical business data for legal and litigation purposes. Google Vault should never be a replacement for a backup solution for your Google Drive data.
File Sync is a Replacement for Backup
While file sync tools like Microsoft OneDrive or Google Drive do create a second copy of files and folders, they are not a replacement for backup. File sync automatically copies changes to synchronized files. So, if a file or folder is infected with ransomware, the malware will automatically be copied to all synced versions of that file.
File sync services do offer some restore capabilities via versioning, but they fall short of a true SaaS backup solution. Here’s why:
Versions are not immutable recovery points. So, if a file is deleted, older versions of the file are deleted as well.
Versioning doesn’t enable centralized management of user data. In other words, you don’t have control over backup and recovery—it’s left in the hands of end users.
Versioning doesn’t maintain recovery points across files, folder, settings and users. If you only to restore a couple of files, no big deal. But, large restores are a time-consuming, manual process.
Beyond simply lacking the restore capabilities of a backup solution, file sync can actually introduce ransomware to SaaS applications. File sync and backup are not competitive solutions, rather they can and should be used side-by-side. Remember: file sync and share is for productivity and backup is for data protection and fast restore.
SaaS Applications are Always Available
While SaaS apps are highly reliable, outages do occur. In October 2020 alone, Microsoft 365 had three significant outages that impacted businesses worldwide. Last year, a massive Google outage affected nearly one billion Gmail, Workplace, and YouTube users.
Outages and slow restore times aren’t just an inconvenience. When businesses can’t access important business data, productivity falls and revenue is impacted. Creating backups that are independent of a SaaS provider’s cloud servers is the only way to ensure access to essential files in the event of an outage.
Why Microsoft Alone is Not Enough to Protect Your Data
With Exchange Online, deleted items (emails, tasks, contacts, and calendar items) can always be restored from the Deleted Items folder; however, once removed, they can only be recovered for a period of 14 days by default. This can be increased up to a maximum of 30 days, after which they are no longer recoverable by any means. In addition, the Recoverable Items folder is subject to a quota, meaning older items may be purged sooner than anticipated.
When an employee account is deleted, the contents of their OneDrive are generally available for 30 days before being moved to Second-Stage, where it is kept for 93 days. Likewise, when individual OneDrive or SharePoint files/folders are deleted, they are moved to the recycle bin; however, if they are hard deleted or the recycle bin is purged, they are moved to Second-Stage and subject to the same 93-day retention policy. Following expiry of the retention period, these deleted files are no longer recoverable by any means.
Malware and other malicious actors will typically hard delete files, so they are not visible in the recycle bin for identification and restoration. Unless the deleted data is noted missing within the retention period, and without a viable backup available, this data may be permanently lost.
1 Week
1 Month
3 Months
1 Year
2 Years
5 Years
1
1
1
1
1
1
Inbox or Folder Data
Deleted Items
Auto-Archived Items
Deleted SharePoint Objects
OneDrive Files/Folders
Employee Turnover
In Microsoft 365
Moved to Archive
In Microsoft 365
Permanently Deleted
In Microsoft 365
Moved to Archive
In Microsoft 365
Second-Stage
Permanently Deleted
In Microsoft 365
Second-Stage
Permanently Deleted
In Microsoft 365
Second-Stage
Permanently Deleted
Average Data Compromise Discovery Period: 140 Days
Why Google Alone is Not Enough to Protect Your Data
When a user soft deletes an email, file/folder, or other item, it remains in the Trash folder for 30 days, unless it is first manually purged. After a 30-day period, items in Trash are automatically purged. Items removed (purged) from Trash are retained for a further 25 days. Following expiry of the 25-day retention period, these items are permanently deleted from Google Workspace and are no longer recoverable by any means.
Malware and other malicious actors will typically empty Trash following delete, known as ‘Delete forever’. Unless the deleted data is noted missing within the restore period, and without a viable backup available, this data may be permanently lost.
1 Week
1 Month
3 Months
1 Year
2 Years
5 Years
1
1
1
1
1
1
Deleted Emails
Deleted GDrive Files/Folders
Restore Items (from Trash)
In Google
Permanently Deleted
In Google
Permanently Deleted
In Google
Permanently Deleted
Average Data Compromise Discovery Period: 140 Days
How would your business respond to a novel cyber incident?
After a Breach, Businesses and Organizations are Primarily Spending on Incident Response and Other New Technology
Respondents who experienced a breach in the past 12 months indicated increased spending on new technologies or services for incident response when personal data was compromised as well as when corporate data was compromised. Businesses and organizations also typically increase spending on new technologies overall following a breach, including technologies spanning detection, protection, recovery, and log collection and retention. Unfortunately, sometimes it takes a breach to unlock security budgets.
1
Personal data was compromised (N = 416)
2
Corporate data was compromised (N = 281)
Increased spending on new technologies or services for incident response
42%
46%
Increased spending on new technologies or services for detection
40%
44%
Increased spending on new technologies or services for protection
39%
43%
Increased spending on new technologies or services for recovery
33%
38%
Increased spending on new technologies or services for log collection and retention
33%
36%
Augmented IT security staff with managed services
23%
25%
Added required two-factor authentication for all employees
22%
24%
Security and/or privacy are regularly evaluated/discussed
21%
23%
Switched security vendors, service providers, or IT auditors
19%
20%
Invested in upskilling and/or training for IT security staff
19%
19%
Hired additional IT security staff
19%
18%
Shifted security strategies
18%
21%
Greater focus on managing risk of third-party relationships
17%
19%
Offered optional two-factor authentication for customers
Your Complete Source for Secure and Productive Business Technologies
Don’t just settle for a simple IT service provider—you need a dedicated partner in technology who cares just as much about the continued success and well-being of your business as you do
02
Detailed Assessment
Once you’re ready to proceed, we’ll conduct a more in-depth assessment of your overall business environment to identify those specific areas which may need immediate attention, including a visit to your work site to review your current physical security and privacy control practices
04
Disaster Planning
No business or organization can ever be made completely immune to cyberattack. We provide a robust, centrally managed backup and recovery solution, ensuring your critical business systems and data are protected and can be quickly restored in the event of mishap or disaster
01
Initial Consultation
Our partnership begins with listening to and understanding your particular business needs and goals. Book a no-pressure consultation to learn more about the services we provide, and how we can help prepare and protect your business from threats like ransomware
03
Security Onboarding
We take action to harden your systems and networks from breach or compromise, including 24x7x365 monitoring from our US-based Security Operations Center. Your teams are introduced to their available support services and are enrolled in essential security awareness training
05
Ongoing Support
Included in every plan, we make Help Desk support available to your entire team to assist with any issues they may have during regular business hours. In the background, our proactive monitoring and maintenance keep your systems safe and secure, and operating at peak performance
Your Complete Source for Secure and Productive Business Technologies
Don’t just settle for a simple IT service provider—you need a dedicated partner in technology who cares just as much about the continued success and well-being of your business as you do
01
Initial Consultation
Our partnership begins with listening to and understanding your particular business needs and goals. Book a no-pressure consultation to learn more about the services we provide, and how we can help prepare and protect your business from threats like ransomware
02
Detailed Assessment
Once you’re ready to proceed, we’ll conduct a more in-depth assessment of your overall business environment to identify those specific areas which may need immediate attention, including a visit to your work site to review your current physical security and privacy control practices
03
Security Onboarding
We take action to harden your systems and networks from breach or compromise, including 24x7x365 monitoring from our US-based Security Operations Center. Your teams are introduced to their available support services and are enrolled in essential security awareness training
04
Disaster Planning
No business or organization can ever be made completely immune to cyberattack. We provide a robust, centrally managed backup and recovery solution, ensuring your critical business systems and data are protected and can be quickly restored to service in the event of mishap or disaster
05
Ongoing Support
Included in every plan, we make Help Desk support available to your entire team to assist with any issues they may have during regular business hours. In the background, our proactive monitoring and maintenance keep your systems safe and secure, and operating at peak performance
Get Tech Back on Your Side
Helping Your Business Reach New Heights with Technology
For every prospering business, IT eventually gets too complicated to manage without professional support. Things stop working like they were, issues and risks continue to pile up, while the next right solution for growing your business seems to be in short supply. It’s natural to feel overwhelmed when your technology is no longer serving you. Thankfully, you’ve found the help you’re looking for!
More than just simple IT support—we’ll secure and monitor your business from cyber threats, expertly curate your technology systems, and empower your teams to make more effective use of the tools they already have. No sneaky add-ons or missing resources, our managed services provide everything your business needs to reach new heights with technology.
Book a Consultation
We're Ready to Keep You Safe
Remove the risks and barriers in your way and take the first step in protecting your business from real threats, like ransomware, by booking a free consultation or complementary site visit. We’re here to help you enjoy the benefits of secure, scalable, and productive IT.